Skip to main content

Dynamic Self-Checking Techniques for Improved Tamper Resistance

  • Conference paper
  • First Online:
Security and Privacy in Digital Rights Management (DRM 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2320))

Included in the following conference series:

Abstract

We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for changes in the executable code as it is running and report modifications. The mechanism is built to be compatible with copy-specific static watermarking and other tamper-resistance techniques. The mechanism includes several innovations to make it stealthy and more robust.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Aucsmith. Tamper resistant software: An implementation. In R. J. Anderson, editor, Information Hiding, Lecture Notes in Computer Science 1174, pages 317–333. Springer-Verlag, 1996.

    Google Scholar 

  2. H. Chang and M. Atallah. Protecting software by guards. This volume.

    Google Scholar 

  3. S. T. Chow, Y. Gu, H. J. Johnson, and V. A. Zakharov. An approach to the obfuscation of control-flow of sequential computer programs. In G. I. Davida and Y. Frankel, editors, ISC 2001, Lecture Notes in Computer Science 2200, pages 144–155. Springer-Verlag, 2001.

    Google Scholar 

  4. C. Collberg and C. Thomborson. Software watermarking: Models and dynamic embeddings. In Principles of Programming Languages, San Antonio, TX, pages 311–324, January 1999.

    Google Scholar 

  5. C. Collberg and C. Thomborson. Watermarking, tamper-proofing, obfuscation — Tools for software protection. Technical Report 2000-03, University of Arizona, February 2000.

    Google Scholar 

  6. C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, University of Auckland, 1997.

    Google Scholar 

  7. C. Collberg, C. Thomborson, and D. Low. Breaking abstractions and unstructuring data structures. In IEEE International Conference on Computer Languages, Chicago, IL, pages 28–38, May 1998.

    Google Scholar 

  8. C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient and stealthy opaque constructs. In Principles of Programming Languages 1998, San Diego, CA, pages 184–196, January 1998.

    Google Scholar 

  9. R. Davidson and N. Myhrvold. Method and systems for generating and auditing a signature for a computer program, September 1996. US Patent 5,559,884. Assignee: Microsoft Corporation.

    Google Scholar 

  10. G. Morrisett, D. Walker, K. Crary, and N. Glew. From system F to typed assembly language. ACM Transactions on Programming Languages and Systems, 21(3):528–569, May 1999.

    Google Scholar 

  11. G. C. Necula. Compiling with proofs. PhD thesis, Carnegie Mellon University, September 1998.

    Google Scholar 

  12. G. C. Necula and P. Lee. Safe kernel extensions without run-time checking. In Proceedings of the Second Symposium on Operating Systems Design and Implementation, Seattle, WA, pages 229–243, October 1996.

    Google Scholar 

  13. J. R. Nickerson, S. T. Chow, and H. J. Johnson. Tamper resistant software: extending trust into a hostile environment. In Multimedia and Security Workshop at ACM Multimedia 2001, Ottawa, CA, October 2001.

    Google Scholar 

  14. T. Sander and C. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, Lecture Notes in Computer Science 1419. Springer-Verlag, 1998.

    Chapter  Google Scholar 

  15. C. Wang. A security architecture of survivable systems. PhD thesis, Department of Computer Science, University of Virginia, 2001.

    Google Scholar 

  16. C. Wang, J. Davidson, J. Hill, and J. Knight. Protection of software-based survivability mechanisms. In IEEE/IFIP International Conference on Dependable Systems and Networks, Goteborg, Sweden, July 2001.

    Google Scholar 

  17. C. Wang, J. Hill, J. Knight, and J. Davidson. Software tamper resistance: Obstructing the static analysis of programs. Technical Report CS-2000-12, Department of Computer Science, University of Virginia, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Horne, B., Matheson, L., Sheehan, C., Tarjan, R.E. (2002). Dynamic Self-Checking Techniques for Improved Tamper Resistance. In: Sander, T. (eds) Security and Privacy in Digital Rights Management. DRM 2001. Lecture Notes in Computer Science, vol 2320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47870-1_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-47870-1_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43677-5

  • Online ISBN: 978-3-540-47870-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics